Spring 2013 Schedule

Date
Chapter
Coverage
Readings
Assignment
Due Date
01/10/2013
Introduction

Read the 3 week1 articles and be prepared to discuss in class.


01/17/2013
Chapter 1
The Threat Environment
SC Mag Video: What is Security (Bruce Schneier)
SC Mag Video: Guarding against insider malfeasance...
SC Mag Video: Shifting the advantage from attacker to defender
Finalize Groups for research/project report.
01/24/2013
01/24/2013
Chapter 2
Planning & Policy

One Sentence Topic Title (for approval)
01/31/2013
01/31/2013
Module A
Networking Concepts



02/07/2013
Chapter 3
Cryptography up to page 171
Read the Cryptography Readings from the Class Readings page
Paper/Project Summary and Assessment Plan
02/14/2013
02/14/2013
Chapter 3 & Chapter 4
Ch 3 171-185; Secure Networks



02/15/2013 to 02/20/2013
Exam 1 (Chapter 1-4, Module A, Readings)




02/21/2013
Chapter 5
Access Controls

Paper/Project Rough Draft/
02/28/2013
02/28/2013
Readings
Passwords
Read the required readings from the Password section of the Class Readings


03/07/2013
Spring Break




03/11/2013
Withdrawal Deadline




03/14/2013
Chapter 6
Firewalls

Access Control Simulation
03/21/2013
03/21/2013
Chapter 7 & 8
Host Hardening & Application Security
Read the required Application Hardening articles section of the Class Readings


03/28/2013
Chapter 9 & 10
Data Protection & Incident and Disaster Response



04/04/2013
Readings
SOX IT Readings
Read the four required readings
from the IT Control and SOX section
of the Class Readings
Security in the News
04/11/2013
04/11/2013
Readings
COSO, COBIT, ERM
From the Frameworks & Standards page, read:
Final Paper
04/18/2013
04/18/2013
TBD
Additional Readings or Research Presentations
  1. Cyberattack's abound yet companies tell SEC losses are few
By Chris Strohm, Eric Engleman and Dave Michaels - Apr 3, 2013)
  1. CF Disclosure Guidance: Topic No. 2 S.E.C. (This guidance provides the Division of Corporation Finance's views regarding disclosure obligations relating to cybersecurity risks and cyber incidents)
  2. ERM for cloud computing (COSO)
  3. PWC Eye of the Storm: Key findings from the 2012 Global State of Information Security Survey:
  4. Investigating the Perceived Threats of Computerized Accounting Information Systems in Developing Countries: An Empirical Study on Saudi Organizations (Abu-Musa, 2006)


04/19/2013 to 04/25/2013
Final Exam (5-10) and Readings